-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security, pages 598-609. ACM, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9(1):1-30, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Washington, DC, USA, IEEE Computer Society
-
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attribute-based encryption. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 321-334, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
D. Boneh, X. Boyen, and E.J. Goh. Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology-EUROCRYPT 2005, pages 440-456, 2005.
-
(2005)
Advances in Cryptology-EUROCRYPT 2005
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
5
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Springer
-
D. Boneh, C. Gentry, and B. Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO 2005, pages 258-275. Springer, 2005.
-
(2005)
Advances in Cryptology-CRYPTO 2005
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
7
-
-
45749116552
-
Provably secure ciphertext policy abe
-
New York, NY, USA, ACM
-
L. Cheung and C. Newport. Provably secure ciphertext policy abe. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 456-465, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
8
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 85-90. ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
9
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
ACM
-
B.G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: Elastic execution between mobile device and cloud. In Proceedings of the sixth conference on Computer systems, pages 301-314. ACM, 2011.
-
(2011)
Proceedings of the Sixth Conference on Computer Systems
, pp. 301-314
-
-
Chun, B.G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
10
-
-
38149121099
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
-
C. Delerablée, P. Paillier, and D. Pointcheval. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. Pairing-Based Cryptography-Pairing 2007, pages 39-59.
-
Pairing-Based Cryptography-Pairing 2007
, pp. 39-59
-
-
Delerablee, C.1
Paillier, P.2
Pointcheval, D.3
-
11
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
VLDB Endowment
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: management of access control evolution on outsourced data. In VLDB '07: Proceedings of the 33rd international conference on Very large data bases, pages 123-134. VLDB Endowment, 2007.
-
(2007)
VLDB '07: Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
12
-
-
74049121230
-
Dynamic provable data possession
-
ACM
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia. Dynamic provable data possession. In Proceedings of the 16th ACM conference on Computer and communications security, pages 213-222. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
13
-
-
84979291225
-
Broadcast Encryption, Advances in Cryptology-Crypto93
-
A. Fiat and M. Naor. Broadcast Encryption, Advances in Cryptology-Crypto93. Lecture Notes in Computer Science, 773:480-491, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
15
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry. Computing arbitrary functions of encrypted data. Communications of the ACM, 53(3):97-105, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
16
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and communications security, pages 89-98, 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
20
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable secure file sharing on untrusted storage. In FAST '03: Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pages 29-42, 2003.
-
(2003)
FAST '03: Proceedings of the 2nd USENIX Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
21
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Berlin, Heidelberg, Springer-Verlag
-
J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT' 08: Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, pages 146-162, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
EUROCRYPT' 08: Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
22
-
-
77954969841
-
NoHype: Virtualized cloud infrastructure without the virtualization
-
ACM
-
E. Keller, J. Szefer, J. Rexford, and R.B. Lee. NoHype: virtualized cloud infrastructure without the virtualization. In Proceedings of the 37th annual international symposium on Computer architecture, pages 350-361. ACM, 2010.
-
(2010)
Proceedings of the 37th Annual International Symposium on Computer Architecture
, pp. 350-361
-
-
Keller, E.1
Szefer, J.2
Rexford, J.3
Lee, R.B.4
-
23
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
IEEE
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou. Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1-5. IEEE.
-
INFOCOM, 2010 Proceedings IEEE
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
24
-
-
33845331515
-
Minimization of Boolean functions
-
E.J. McCluskey. Minimization of Boolean functions. Bell System Technical Journal, 35(5):1417-1444, 1956.
-
(1956)
Bell System Technical Journal
, vol.35
, Issue.5
, pp. 1417-1444
-
-
McCluskey, E.J.1
-
26
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages 199-212. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
28
-
-
0030086382
-
Role-based access control models
-
RS Sandhu, EJ Coyne, HL Feinstein, and CE Youman. Role-based access control models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
29
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
IEEE
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1-9. IEEE, 2010.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
31
-
-
74049154660
-
Secure and efficient access to outsourced data
-
ACM
-
W. Wang, Z. Li, R. Owens, and B. Bhargava. Secure and efficient access to outsourced data. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 55-66. ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
33
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
IEEE
-
S. Yu, C. Wang, K. Ren, and W. Lou. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. INFOCOM' 1010. Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, pages 1-9, 2010.
-
(2010)
INFOCOM' 1010. Conference of the IEEE Computer and Communications Societies. Proceedings
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
34
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
ACM
-
S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 261-270. ACM, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
35
-
-
74049138993
-
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
-
ACM
-
A. Yun, C. Shi, and Y. Kim. On protecting integrity and confidentiality of cryptographic file system for outsourced storage. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages 67-76. ACM, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 67-76
-
-
Yun, A.1
Shi, C.2
Kim, Y.3
|